mirror of https://gitee.com/openkylin/linux.git
4e78c724d4
In tomoyo_mount_acl() since 2.6.36, kern_path() was called without checking dev_name != NULL. As a result, an unprivileged user can trigger oops by issuing mount(NULL, "/", "ext3", 0, NULL) request. Fix this by checking dev_name != NULL before calling kern_path(dev_name). Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> Cc: stable@kernel.org Signed-off-by: James Morris <jmorris@namei.org> |
||
---|---|---|
.. | ||
Kconfig | ||
Makefile | ||
common.c | ||
common.h | ||
domain.c | ||
file.c | ||
gc.c | ||
group.c | ||
load_policy.c | ||
memory.c | ||
mount.c | ||
realpath.c | ||
securityfs_if.c | ||
tomoyo.c | ||
util.c |